EP1269289B1 - Logging in - Google Patents

Logging in Download PDF

Info

Publication number
EP1269289B1
EP1269289B1 EP01916020A EP01916020A EP1269289B1 EP 1269289 B1 EP1269289 B1 EP 1269289B1 EP 01916020 A EP01916020 A EP 01916020A EP 01916020 A EP01916020 A EP 01916020A EP 1269289 B1 EP1269289 B1 EP 1269289B1
Authority
EP
European Patent Office
Prior art keywords
user
access
coordinates
unit
checking means
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP01916020A
Other languages
German (de)
French (fr)
Other versions
EP1269289A1 (en
Inventor
Christer FÅHRAEUS
Petter Ericson
Sven Olof Karlsson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anoto AB
Original Assignee
Anoto IP LIC HB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anoto IP LIC HB filed Critical Anoto IP LIC HB
Priority to EP06114737A priority Critical patent/EP1698994A3/en
Publication of EP1269289A1 publication Critical patent/EP1269289A1/en
Application granted granted Critical
Publication of EP1269289B1 publication Critical patent/EP1269289B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0354Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
    • G06F3/03545Pens or stylus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/24Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a handwritten signature
    • G07C9/243Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a handwritten signature visually, e.g. by comparing in a viewer the written signature with a reference on the pass
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Definitions

  • the present invention relates to a system for controlling a user's access to an access-protected unit, a checking device for checking the access of a user to an access-protected unit, a method for controlling access, a computer program for performing the method and use of a position-coding pattern.
  • a usual access protection for a computer consists in that a user must log in to the computer to be able to use it. On logging-in, the user enters his user identity and a password into the computer which checks this information against information stored earlier in order to determine if the user is authorised to use the computer.
  • the disadvantage of this process is that a user must memorise his password which can be difficult since we surround sacred with many systems which demand a logging-in process and since these often have different passwords. Many write down their password, with the consequence that, if someone finds the record, this person can get into the system associated with the password in a simple manner. If the user then also has the same password for several different systems, this can have far-reaching consequences.
  • WO 99/48268 It is also known from WO 99/48268 to replace the PIN code in a mobile communication unit with a signature which the user writes with the communication unit.
  • the communication unit is equipped with a sensor of the gyrosensor or pressure-ball type which senses the movement when the user is writing with the unit.
  • EP 0 902 352 discloses a technique for authentication based on a combination of a digitizing tablet and a card provided with a plurality of discontinuous holes, cutouts or marks, which guides the user to input a pattern of coordinates, e.g. by operating a pen on the card when placed on the tablet.
  • the recorded pattern of coordinates is used in authentication of the user
  • the invention is based on the concept of using a new parameter, namely coordinates, as a basis for checking the access to an access-protected unit.
  • An advantage of a system which is based on coordinates is that, as will be seen below, it can be constructed with varying degrees of security, from a very simple system where it is enough to register a correct pair of coordinates, to a very secure system where both, for example, a correct pair of coordinates and a correct signature and/or the identity of the user must be registered.
  • Coordinates are especially suitable for being used as a basis for access control when the access-protected unit lacks a keyboard, since coordinates can be registered, for example, by being read with a sensor.
  • the coordinates can be advantageously registered by the user unit optically reading a position-coding pattern which codes coordinates for a plurality of points. Access to an access-protected unit can then be obtained by the user registering coordinates for points within a particular coordinate area.
  • Coordinates are also specially suitable for being used as parameters for access-control in systems for electronic registration of handwriting since handwritten text which is written on a writing surface with position-coding patterns can be registered electronically as a sequence of coordinates by continuous reading of the position-coding pattern.
  • Position-coding patterns which can be used for registering handwritten text are described in, for example, US 5,852,434 and Applicant's Patent Applications WO 00/73983 and PCT/SE00/1667 the contents of which is included in the present specification by reference.
  • WO 01/16691 the content of which is included in the present specification by reference.
  • At least the position-coding patterns described in Applicant's patent applications can code coordinates for a very large number of positions on an imaginary surface. Different coordinate areas can then be allocated to different users and the position-coding pattern which corresponds to the coordinate area can be imaged on a personal card or the like which is allocated to the user. He can only access a certain access-protected unit by reading coordinates from this card.
  • the access-protected unit is a unit which is to be protected from unauthorised persons.
  • Examples of access-protected units are computers, buildings, vehicles, web pages and different types of electronic equipment.
  • the checking means is thus arranged to check if the coordinates are lying within a predetermine coordinate area for checking the authorisation of the user.
  • a hand-held scanner or digital pen can be envisaged for electronic registration of handwriting, where the owner can only log in by registering coordinates from a card which he has obtained with the purchase of the scanner/pen.
  • the checking means is located in the scanner/pen and only needs to have information on the extent of the predetermined coordinate area and to check that the registered coordinates are lying within this field.
  • Logging-in on different scanners/pens can require coordinates from different coordinate areas.
  • the coordinate area is defined in advance and can, for example, be defined as lying within determined coordinates which represent the corners of the field.
  • the user unit is arranged to register a user signature as a sequence of coordinates which describe the displacement of the user unit when a user is writing the user signature with the user unit and said at least one pair of coordinates comprise the sequence of coordinates.
  • the signature is normally the signed name of the user but can also be a symbol or any type of sign.
  • the signature is normally the signed name of the user but can also be a symbol or any type of sign.
  • This higher security can be implemented without the hardware of the system needing to be changed, since registration of the signature and registration of the coordinates can be done with the same technology.
  • the checking means is suitably arranged to compare the sequence of coordinates which thus represent the registered signature, with a previously stored sequence of coordinates for checking the authorisation of the user.
  • the enabling signal for the access-protected unit is only given if the sequences correspond to the desired extent.
  • the user unit has a unique identification code and the checking means is arranged to check the authorisation of the user with said identification code in combination with said at least one pair of coordinates.
  • the identification code can be an identification number such as PIN (Personal Identification Number), a symbol or any type of sign.
  • the user unit is arranged to register a sequence of coordinates which is associated to a specific access-protected unit.
  • the user can write different commands with the user unit and the user unit then register this as sequences of coordinates.
  • the user can be enabled. In this way the user can use the same equipment to log-in to different physical units.
  • the user unit, the checking means and the access-protected unit can be physically placed in different ways with respect to one another.
  • the checking means can be physically integrated with the user unit, with the access-protected unit or be self-contained.
  • the checking means can also be physically divided, which implies that a certain part of the authorisation check is done in one place and another part of the authorisation check is done in another place. For example, a first check can be done in the user unit and a second check in the access-protected unit.
  • the checking means When the checking means is self-contained, they can be used jointly for a plurality of user units and a plurality of access-protected units. They then become more complicated and need to have a greater memory and processing capacity, among other things.
  • the checking means When the checking means is integrated with the user unit, they only need to check users of the access-protected unit or units which can be accessed via the user unit.
  • the access-protected unit is integrated with the user unit.
  • the access then applies to the user unit itself, the user unit and the access-protected unit can being seen as one and the same unit.
  • the user starts the unit and must then carry out a logging-in, during which he can only use the functions of the unit which are required for logging-in, i.e. registration of coordinates and possibly other logging-in parameters.
  • the functions which are accessible during logging-in can be said to correspond to the user unit whilst the remaining functions which become accessible only after correct logging-in can be said to correspond to the access-protected unit.
  • the checking means can be, but do not have to be, integrated with the user unit and the access-protected unit.
  • the access-protected unit can be isolated from the user unit. It can be integrated with the checking means.
  • the access-protected unit is a digital pen which can be used for digitising handwritten text.
  • the checking means can be common to a number of user units which send the registrated coordinates to the checking means.
  • the information stored in the checking means relates to a plurality of coordinate areas.
  • the checking means can be, for example, web-based and reached via a computer network.
  • Each coordinate area can be associated with one or more users and/or one or more access-protected units.
  • a number of users can thus reach a unit by registering coordinates from one and the same predetermined field.
  • the access-protected unit is a computer which a number of persons are to be able to use, or premises which a number of persons are to be able to gain entry to.
  • a person can access different access-protected units by registering coordinates from one and the same predetermined coordinate area. For example, a person can wish to log in to different apparatuses via a standard logging-in process.
  • the access-protected unit is associated with at least one of said plurality of coordinate areas.
  • the coordinates which are registered by the user unit control for which access-protected unit the access is intended. This results in a simple and flexible way of obtaining access to a certain access-protected unit.
  • Different coordinate areas can be associated with different access-protected units.
  • a coordinate area can also be associated with more than one access-protected unit, but then the user has to indicate in some way which access-protected unit he wishes to access.
  • the access-protected unit is arranged to start at least one function associated with at least one of said plurality of coordinate areas.
  • One advantage with this is that it saves the user time when he is logging-in to an access-protected unit.
  • the user can initially decide which functions he wishes to start when he is logging in. This set ups can be changed when the user is logged in.
  • Function includes different kinds of applications and programs.
  • the coordinates which are registered by the user unit here control the user identity.
  • the coordinate area which is associated with at least one authorised user there can also be subareas which are associated with different access-protected units. The advantage of this is that if someone can forge a signature, he must also have access to the base with the predetermined coordinates which are associated with the signature.
  • the system comprises a base which is provided with a position-coding pattern which enables coordinates to be determined and from which the user unit is arranged to register said at least one pair of coordinates.
  • Different coordinates are registered depending on where on the base the user places the user unit.
  • the coordinates can be allocated different meanings.
  • the base can be divided into different coordinate areas in which the user writes his signature or only places the user unit. Depending on which coordinate area the user is selecting, for example, access to different units can be carried out. This results in a quick and flexible activation of the access-protected unit for the user.
  • the user unit comprises an optical sensor and image-processing means for registering said at least one pair of coordinates.
  • the optical sensor obtains images and the image-processing means process the images, which comprises determination of the coordinates from the content of the images, which content can be the above-mentioned position-coding pattern.
  • the first example relates to access to a digital pen.
  • the second example relates to access to a computer.
  • the whole system for controlling access to the digital pen is integrated with the digital pen.
  • the system for access control is separate from the access-protected unit, i.e. the computer.
  • Fig. 1 shows a digital pen 1 and a coordinate base 5.
  • the digital pen 1 can be used as a normal pen, with the difference that the text which is written can be obtained in digital form in the pen.
  • a system for controlling access to it a logging-in system.
  • Fig. 1 shows an example of a logging-in card 5 which in this case is similar to a normal magnetic or credit card with respect to size and material.
  • the logging-in card 5 has a writing field 6 which may have a size of 10 mm times 200 mm and can be provided with coordinates which can be read by the digital pen 1.
  • the coordinates can be specified in explicit or coded form.
  • the logging-in card 5 is provided with coordinates which are coded with the aid of a position-coding pattern 7.
  • the pattern 7 is shown schematically as a number of dots on a part of the logging-in card 5.
  • the writing field 6 is intended for the user's signature.
  • the logging-in card can be made of such a material that the signature can be erased after having been written.
  • the combination of pen and logging-in card can be such that no pigment is deposited on the logging-in card when the user is writing the signature.
  • the position-coding pattern 7 has the characteristic that, if an arbitrary part of the pattern is registered with a certain minimum size, its position in the position-coding pattern and thus the logging-in card 5 is determined unambiguously.
  • the position-coding pattern 7 can be of the type shown in US 5,852,434 where each position is coded by a specific symbol.
  • the position-coding pattern 7 is advantageously of the type shown in Applicant's above-mentioned Applications WO 00/73983 and PCT/SE00/01667, where each position is coded by a plurality of symbols and each symbol contributes to the coding of a number of positions.
  • the position-coding pattern 7 is built up of a small number of types of symbol.
  • An example is shown in PCT/SE00/01667, where a larger dot represents a "one" and a smaller dot represents a "zero”.
  • Another example is shown in WO 00/73983, where four different displacements of a dot in relation to a raster point code four different values.
  • the digital pen 1 in Fig. 1 comprises a casing 11. In the short side of the casing, an opening 12 is located.
  • the casing contains mainly an optical part, an electronic part and a power supply.
  • the optical part comprises at least one light-emitting diode 13 for illuminating the surface which is to be imaged and a light-sensitive area sensor 14, for example a CCD or CMOS sensor, for registering a two-dimensional image.
  • the pen may also contain a lens system.
  • the power supply for the pen is obtained from a battery 15 which is mounted in a separate compartment in the casing 11.
  • the electronic part contains a processor 16 which is programmed for recording an image from the sensor 14, identifying symbols in the image, determining which one pair of coordinates the symbols are coding and storing these coordinates in its memory.
  • the processor 16 is also programmed for analysing the stored pairs of coordinates and converting them to a polygon train which constitutes a description of how the user unit is displaced over a surface which is provided with the position-coding pattern, which displacement, for example, can represent the user's signature or some other form of handwritten information.
  • the pen 1 also comprises a pen point 17 with the aid of which the user can write normal pigment-based writing which, at the same time as it is written, is registered digitally by the pen 1 with the aid of the position-coding pattern.
  • the pen point 17 can be retracted and extended so that the user can control if it is to be used or not.
  • the pen 1 also comprises buttons 18 with the aid of which the unit is activated and controlled. It also has a transceiver 19 for wireless communication, for example by IR light or radio waves, with external units.
  • the pen 1 is provided with a logging-in system.
  • the user When the pen is switched on, the user must log in in order to be able to use it.
  • the pen 1 To handle the logging-in, the pen 1 is provided with a logging-in program.
  • information regarding at least the user's specific coordinate area is stored in the memory.
  • the access-unit is the digital pen 1 which also comprises the checking means which comprise a memory in which coordinate areas and associated user identities are stored.
  • the checking means can be a memory in which coordinate areas and associated user identities are stored.
  • Each user can have his own logging-in card 5.
  • the logging-in card 5 can be a card which the user carries with him, for example in his wallet.
  • a program converts the pattern into coordinates which are transferred to the checking means.
  • the checking means checks that the coordinates are lying within a predetermined coordinate area belonging to an authorised user.
  • the user obtains access to the functions of the digital pen 1.
  • Different users have different coordinate areas, which entails that it is possible to control which programs different users are to be able to access by the pen starting a different program depending on into which coordinate area the registered coordinates get.
  • To increase security on logging-in it can be required that a user writes his signature in the writing field.
  • the signature is transferred to the checking means as a sequence of coordinates.
  • the checking means also checks, in addition to the field within which the coordinates are located, if the sequence of coordinates for this coordinate area corresponds to an authorised sequence stored in the memory. It is then not enough that an unauthorised person obtains the writing base and pen, but the unauthorised person must also be able to forge the signature of the authorised user in order to gain access to the functions of the pen.
  • Fig. 2 shows a second embodiment of the invention, in which the access-protected unit is a computer 4, the user unit is a digital pen 1 and the checking means is available on the web in the form of a server unit 2.
  • the server unit 2 handles a plurality of digital pens 1 and a plurality of computers 4.
  • the digital pen 1 is arranged to transfer information which is generated by the user to the server unit 2.
  • the information is transferred wirelessly to a network-access unit 8 which, in turn, transfers the information to the server unit 2.
  • the network-access unit 8 is a mobile telephone in this example.
  • it can be a computer or some other suitable unit which has an interface with a network, for example the Internet or a local company network.
  • the network-access unit can constitute an integrated part of the user unit.
  • the server unit 2 is a computer in a network of computers. It is constructed as a traditional server unit with one or more processors, memory of different types, peripheral units and couplings to other computers in the network but it has new software for carrying out the functions described here. It also has information stored in its memory in order to be able to handle these functions.
  • the coordinate areas can be of different size and have different shape.
  • a rectangular coordinate area for example, can be described with the aid of pairs of coordinates which represent points in the corners of the coordinate area.
  • the writing field 6 on the logging-in card 5 occupies one coordinate area.
  • Fig. 3 shows an example of such a structure which here constitutes a table.
  • the coordinate areas are defined with the aid of the coordinates (x1,y1; x2,y2; x3,y3; x4,y4) for the corners of the coordinate area which have been assumed to be rectangular in this case.
  • a representation of the signature of the authorised user is stored so that the server unit 2 can compare a received signature with a signature stored earlier.
  • a user identity is stored in the form of a serial number for the user unit 1 of the authorised user.
  • this is a very simple structure which is only used for illustrating the principles. Considerably more complex structures and rules for security checking are conceivable.
  • Fig. 4 shows a flow chart of the following embodiment of the method.
  • a user wishes to obtain access to a computer 4, he places the digital pen 1 on the writing field 6 and the pen 1 registers 100 the pattern 7 and calculates corresponding coordinates.
  • the coordinates, together with a user identity stored in the user unit 1, are forwarded via the mobile telephone 8 to the server unit 2.
  • the server unit 2 checks to which coordinate area the registered coordinates belong.
  • Each computer 4 in the system is associated with at least one coordinate area.
  • the server unit 2 determines in this way for which computer the access is intended.
  • the server unit 2 checks that the user identity has the authority 110 to log in to the computer for which the logging-in is intended.
  • a signal 120 is sent to the computer 4 for which the access is intended, which results in the user now being logged in to the computer 4.
  • This special information can comprise user-specific information which, for example, starts programs specific to the user. It can also be that different users obtain access to different amounts of information on the computer 4, which has the result that only certain parts of the content of the computer 4 are opened up to the user. If the user does not have authorisation for the computer 4, a message about this can be sent to the digital pen 1.
  • the user also writes his signature on the writing field 6 of the logging-in card 5.
  • the signature is registered as a sequence of coordinates and, together with the user identity stored in the user unit, is forwarded via the mobile telephone 8 to the server unit 2.
  • the server unit 2 compares the received sequence of coordinates, i.e. the signature, with a previously stored sequence of coordinates with the user identity. If the received signature is determined to correspond, a signal is sent to the computer 4 and the user is logged in.
  • checking means in the computer 4, i.e. the access-protected unit. Logging-in to different entities
  • a third embodiment of the invention is similar to the second embodiment but in this embodiment the user can log-in to different physical entities and by writing a certain command chose which entity to log-in to.
  • the writing field 6 is in this embodiment used to write a certain command associated with a certain physical entity for example a computer.
  • the digital pen has a unique PIN (Personal Identification Number).
  • the digital pen is arranged to transfer the unique PIN and information, generated by the user, to the server unit.
  • Fig. 5 shows an example of such a structure which constitute a table.
  • the coordinate areas are defined with the aid of the coordinates (x1,y1; x2,y2) for determine the corners of the coordinate area which have been assumed to be rectangular in this case.
  • a representation of a command associated with an access-protected unit which is represented in column 42, is stored.
  • a PIN is stored so that the server unit 2 can compare a received PIN with a PIN stored earlier.
  • this is a very simple structure which is only used for illustrating the principles. Considerably more complex structures and rules for security checking are conceivable.
  • a user When a user wishes to obtain access to a computer 4, he places the digital pen 1 on the writing field 6 and the pen registers the pattern 7 and calculates corresponding coordinates.
  • the user writes the command "comp” to log-in to the computer.
  • the pen registers the written command and calculates the relative corresponding coordinates.
  • the pen then forwards the coordinates and the PIN "435 543" of the digital pen 1 via the mobile phone 8 to the server unit 2.
  • the server unit checks to which coordinate area the registered coordinate belong. Each user in the system is associated with at least one coordinate area.
  • the server unit checks the command "comp” to determine which physical unit the user is logging in to. In this case "comp” is associated with "Computer 23". Thereafter it checks the PIN to determine if this pen in combination with the pattern 7 is allowed to have access to "Computer 23". If access is allowed the server unit 2 sends a signal to "Computer 23" and the user is logged in.
  • a predetermined coordinate area on a writing base can also function as a non-recurrent field which, after having been used once, is used up. This can be applicable, for example, when it is wished to be able to discard the writing base after use or when it is wished to keep it as a receipt for access to the system. It can be that the signature is also written on the base with ink, with the result that if an unauthorised person finds the slip, it can be relatively simple for him to follow the written signature and in this way obtain access to the access-protected unit. If, on the other hand, this pattern is used up, the only information remaining is the signature of the user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Mathematical Physics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)
  • Steroid Compounds (AREA)
  • User Interface Of Digital Computer (AREA)
  • Carbon And Carbon Compounds (AREA)

Abstract

A system for controlling a user's access to an access-protected unit (4). The system comprises a user unit (1) which is arranged to register at least one pair of coordinates, and checking means (2) which is arranged to check, on the basis of the coordinates, if the user is authorised to access the access-protected unit (4). If the user is authorised, the checking means is arranged to provide an enabling signal to the access-protected unit (4).

Description

    Field of the Invention
  • The present invention relates to a system for controlling a user's access to an access-protected unit, a checking device for checking the access of a user to an access-protected unit, a method for controlling access, a computer program for performing the method and use of a position-coding pattern.
  • Background of the Invention
  • To protect different types of systems and devices such as, for example, computers or other electronic equipment, against unauthorised persons, it is known to equip them with some type of access protection. A usual access protection for a computer consists in that a user must log in to the computer to be able to use it. On logging-in, the user enters his user identity and a password into the computer which checks this information against information stored earlier in order to determine if the user is authorised to use the computer. The disadvantage of this process is that a user must memorise his password which can be difficult since we surround ourselves with many systems which demand a logging-in process and since these often have different passwords. Many write down their password, with the consequence that, if someone finds the record, this person can get into the system associated with the password in a simple manner. If the user then also has the same password for several different systems, this can have far-reaching consequences.
  • In the Japanese document JP10222241 "Electronic Pen and System and Method for Individual Authentication", an electronic pen is described which is equipped with a gyrosensor which, when the user is writing his signature with the pen, senses features of the signature and produces a password by means of an algorithm.
  • It is also known from WO 99/48268 to replace the PIN code in a mobile communication unit with a signature which the user writes with the communication unit. The communication unit is equipped with a sensor of the gyrosensor or pressure-ball type which senses the movement when the user is writing with the unit.
  • One problem of the above-mentioned techniques is that a signature is not especially difficult to forge.
  • EP 0 902 352 discloses a technique for authentication based on a combination of a digitizing tablet and a card provided with a plurality of discontinuous holes, cutouts or marks, which guides the user to input a pattern of coordinates, e.g. by operating a pen on the card when placed on the tablet. The recorded pattern of coordinates is used in authentication of the user
  • Summary of the Invention
  • It is therefore an object of the invention to provide a system which enables simple and reliable checking of the access to an access-protected unit.
  • This object is achieved with a system according to claim 1.
  • The invention is based on the concept of using a new parameter, namely coordinates, as a basis for checking the access to an access-protected unit. An advantage of a system which is based on coordinates is that, as will be seen below, it can be constructed with varying degrees of security, from a very simple system where it is enough to register a correct pair of coordinates, to a very secure system where both, for example, a correct pair of coordinates and a correct signature and/or the identity of the user must be registered.
  • Coordinates are especially suitable for being used as a basis for access control when the access-protected unit lacks a keyboard, since coordinates can be registered, for example, by being read with a sensor.
  • For example, the coordinates can be advantageously registered by the user unit optically reading a position-coding pattern which codes coordinates for a plurality of points. Access to an access-protected unit can then be obtained by the user registering coordinates for points within a particular coordinate area.
  • Coordinates are also specially suitable for being used as parameters for access-control in systems for electronic registration of handwriting since handwritten text which is written on a writing surface with position-coding patterns can be registered electronically as a sequence of coordinates by continuous reading of the position-coding pattern. Position-coding patterns which can be used for registering handwritten text are described in, for example, US 5,852,434 and Applicant's Patent Applications WO 00/73983 and PCT/SE00/1667 the contents of which is included in the present specification by reference. Moreover, reference is made to WO 01/16691, the content of which is included in the present specification by reference. At least the position-coding patterns described in Applicant's patent applications can code coordinates for a very large number of positions on an imaginary surface. Different coordinate areas can then be allocated to different users and the position-coding pattern which corresponds to the coordinate area can be imaged on a personal card or the like which is allocated to the user. He can only access a certain access-protected unit by reading coordinates from this card.
  • The access-protected unit is a unit which is to be protected from unauthorised persons. Examples of access-protected units are computers, buildings, vehicles, web pages and different types of electronic equipment.
  • The checking means is thus arranged to check if the coordinates are lying within a predetermine coordinate area for checking the authorisation of the user.
  • As a very simple example, a hand-held scanner or digital pen can be envisaged for electronic registration of handwriting, where the owner can only log in by registering coordinates from a card which he has obtained with the purchase of the scanner/pen. In this case, the checking means is located in the scanner/pen and only needs to have information on the extent of the predetermined coordinate area and to check that the registered coordinates are lying within this field.
  • Logging-in on different scanners/pens can require coordinates from different coordinate areas.
  • The coordinate area is defined in advance and can, for example, be defined as lying within determined coordinates which represent the corners of the field.
  • In an advantageous embodiment of the system, the user unit is arranged to register a user signature as a sequence of coordinates which describe the displacement of the user unit when a user is writing the user signature with the user unit and said at least one pair of coordinates comprise the sequence of coordinates.
  • An advantage of the user writing his signature is that the security increases. The signature is normally the signed name of the user but can also be a symbol or any type of sign. For an unauthorised person to be able to log in to the access-protected unit, both access to the coordinate area and signature of the authorised user are required in this case. This higher security can be implemented without the hardware of the system needing to be changed, since registration of the signature and registration of the coordinates can be done with the same technology.
  • The checking means is suitably arranged to compare the sequence of coordinates which thus represent the registered signature, with a previously stored sequence of coordinates for checking the authorisation of the user. The enabling signal for the access-protected unit is only given if the sequences correspond to the desired extent.
  • In one embodiment of the system, the user unit has a unique identification code and the checking means is arranged to check the authorisation of the user with said identification code in combination with said at least one pair of coordinates.
  • By checking not only the coordinates but also the identification code the security of the system will increase. If for example the coordinates are imaged on a card and this card is stolen, the thief can not have access to the access-protected unit without the associated user unit. The identification code can be an identification number such as PIN (Personal Identification Number), a symbol or any type of sign.
  • In another embodiment of the system the user unit is arranged to register a sequence of coordinates which is associated to a specific access-protected unit.
  • For example the user can write different commands with the user unit and the user unit then register this as sequences of coordinates. Depending on what commands the user is writing different access-protected units can be enabled. In this way the user can use the same equipment to log-in to different physical units. The user unit, the checking means and the access-protected unit can be physically placed in different ways with respect to one another.
  • The checking means can be physically integrated with the user unit, with the access-protected unit or be self-contained. The checking means can also be physically divided, which implies that a certain part of the authorisation check is done in one place and another part of the authorisation check is done in another place. For example, a first check can be done in the user unit and a second check in the access-protected unit.
  • When the checking means is self-contained, they can be used jointly for a plurality of user units and a plurality of access-protected units. They then become more complicated and need to have a greater memory and processing capacity, among other things.
  • When the checking means is integrated with the user unit, they only need to check users of the access-protected unit or units which can be accessed via the user unit.
  • In one embodiment of the system, the access-protected unit is integrated with the user unit.
  • The access then applies to the user unit itself, the user unit and the access-protected unit can being seen as one and the same unit. In this case, the user starts the unit and must then carry out a logging-in, during which he can only use the functions of the unit which are required for logging-in, i.e. registration of coordinates and possibly other logging-in parameters. The functions which are accessible during logging-in can be said to correspond to the user unit whilst the remaining functions which become accessible only after correct logging-in can be said to correspond to the access-protected unit.
  • The checking means can be, but do not have to be, integrated with the user unit and the access-protected unit.
  • As an alternative, the access-protected unit can be isolated from the user unit. It can be integrated with the checking means.
  • In an advantageous embodiment of the system, the access-protected unit is a digital pen which can be used for digitising handwritten text.
  • As already mentioned, the checking means can be common to a number of user units which send the registrated coordinates to the checking means. In this embodiment of the system, the information stored in the checking means relates to a plurality of coordinate areas. The checking means can be, for example, web-based and reached via a computer network.
  • Each coordinate area can be associated with one or more users and/or one or more access-protected units. In the former case, a number of users can thus reach a unit by registering coordinates from one and the same predetermined field. This can be desirable, for example, if the access-protected unit is a computer which a number of persons are to be able to use, or premises which a number of persons are to be able to gain entry to. In the latter case, for example, a person can access different access-protected units by registering coordinates from one and the same predetermined coordinate area. For example, a person can wish to log in to different apparatuses via a standard logging-in process.
  • In an embodiment of the system, the access-protected unit is associated with at least one of said plurality of coordinate areas.
  • The coordinates which are registered by the user unit control for which access-protected unit the access is intended. This results in a simple and flexible way of obtaining access to a certain access-protected unit. Different coordinate areas can be associated with different access-protected units. A coordinate area can also be associated with more than one access-protected unit, but then the user has to indicate in some way which access-protected unit he wishes to access.
  • In one embodiment of the system, if the user is authorised to access the access-protected unit, the access-protected unit is arranged to start at least one function associated with at least one of said plurality of coordinate areas.
  • One advantage with this is that it saves the user time when he is logging-in to an access-protected unit. The user can initially decide which functions he wishes to start when he is logging in. This set ups can be changed when the user is logged in. Function includes different kinds of applications and programs. In one embodiment of the system, there is at least one authorised user identity which is associated with at least one of said plurality of coordinate areas.
  • The coordinates which are registered by the user unit here control the user identity. Within the coordinate area which is associated with at least one authorised user, there can also be subareas which are associated with different access-protected units. The advantage of this is that if someone can forge a signature, he must also have access to the base with the predetermined coordinates which are associated with the signature.
  • In one embodiment, the system comprises a base which is provided with a position-coding pattern which enables coordinates to be determined and from which the user unit is arranged to register said at least one pair of coordinates.
  • Different coordinates are registered depending on where on the base the user places the user unit. The coordinates can be allocated different meanings. The base can be divided into different coordinate areas in which the user writes his signature or only places the user unit. Depending on which coordinate area the user is selecting, for example, access to different units can be carried out. This results in a quick and flexible activation of the access-protected unit for the user.
  • In one embodiment, the user unit comprises an optical sensor and image-processing means for registering said at least one pair of coordinates.
  • The optical sensor obtains images and the image-processing means process the images, which comprises determination of the coordinates from the content of the images, which content can be the above-mentioned position-coding pattern.
  • Brief Description of the Drawings
  • The invention will be described in greater detail in the text which follows, by means of embodiments and referring to the accompanying drawings, in which
    • Fig. 1 shows a system according to a first embodiment of the present invention, which system comprises a digital pen and a coordinate base.
    • Fig. 2 shows an example of a second embodiment of a system according to the invention, which system comprises a user unit and a logging-in card.
    • Fig. 3 schematically shows an example of a storage structure for storing, among other things, checking information in a checking device which is used in a system according to the invention.
    • Fig. 4 shows a flow chart of a logging-in method according to one embodiment of the invention.
    • Fig. 5 schematically shows another example of a storage structure for storing, among other things, checking information in a checking device which is used in a system according to the invention.
    Description of Preferred Embodiments
  • In the text which follows, two examples are given of how the invention can be implemented. The first example relates to access to a digital pen. The second example relates to access to a computer. In the first example, the whole system for controlling access to the digital pen is integrated with the digital pen. In the second example, the system for access control is separate from the access-protected unit, i.e. the computer.
  • Fig. 1 shows a digital pen 1 and a coordinate base 5. The digital pen 1 can be used as a normal pen, with the difference that the text which is written can be obtained in digital form in the pen. To protect the pen against unauthorised users, it is provided with a system for controlling access to it (a logging-in system). Logging-in Card
  • Fig. 1 shows an example of a logging-in card 5 which in this case is similar to a normal magnetic or credit card with respect to size and material. The logging-in card 5 has a writing field 6 which may have a size of 10 mm times 200 mm and can be provided with coordinates which can be read by the digital pen 1. The coordinates can be specified in explicit or coded form. In this example, the logging-in card 5 is provided with coordinates which are coded with the aid of a position-coding pattern 7. The pattern 7 is shown schematically as a number of dots on a part of the logging-in card 5.
  • The writing field 6 is intended for the user's signature. The logging-in card can be made of such a material that the signature can be erased after having been written. As an alternative, the combination of pen and logging-in card can be such that no pigment is deposited on the logging-in card when the user is writing the signature.
  • The position-coding pattern 7 has the characteristic that, if an arbitrary part of the pattern is registered with a certain minimum size, its position in the position-coding pattern and thus the logging-in card 5 is determined unambiguously.
  • The position-coding pattern 7 can be of the type shown in US 5,852,434 where each position is coded by a specific symbol.
  • However, the position-coding pattern 7 is advantageously of the type shown in Applicant's above-mentioned Applications WO 00/73983 and PCT/SE00/01667, where each position is coded by a plurality of symbols and each symbol contributes to the coding of a number of positions. The position-coding pattern 7 is built up of a small number of types of symbol. An example is shown in PCT/SE00/01667, where a larger dot represents a "one" and a smaller dot represents a "zero". Another example is shown in WO 00/73983, where four different displacements of a dot in relation to a raster point code four different values.
  • Digital Pen
  • The digital pen 1 in Fig. 1 comprises a casing 11. In the short side of the casing, an opening 12 is located.
  • The casing contains mainly an optical part, an electronic part and a power supply.
  • The optical part comprises at least one light-emitting diode 13 for illuminating the surface which is to be imaged and a light-sensitive area sensor 14, for example a CCD or CMOS sensor, for registering a two-dimensional image. The pen may also contain a lens system.
  • The power supply for the pen is obtained from a battery 15 which is mounted in a separate compartment in the casing 11.
  • The electronic part contains a processor 16 which is programmed for recording an image from the sensor 14, identifying symbols in the image, determining which one pair of coordinates the symbols are coding and storing these coordinates in its memory. The processor 16 is also programmed for analysing the stored pairs of coordinates and converting them to a polygon train which constitutes a description of how the user unit is displaced over a surface which is provided with the position-coding pattern, which displacement, for example, can represent the user's signature or some other form of handwritten information.
  • The pen 1 also comprises a pen point 17 with the aid of which the user can write normal pigment-based writing which, at the same time as it is written, is registered digitally by the pen 1 with the aid of the position-coding pattern. The pen point 17 can be retracted and extended so that the user can control if it is to be used or not.
  • The pen 1 also comprises buttons 18 with the aid of which the unit is activated and controlled. It also has a transceiver 19 for wireless communication, for example by IR light or radio waves, with external units.
  • Logging-in with the Aid of the Pen
  • As mentioned, the pen 1 is provided with a logging-in system. When the pen is switched on, the user must log in in order to be able to use it. To handle the logging-in, the pen 1 is provided with a logging-in program. Moreover, information regarding at least the user's specific coordinate area is stored in the memory.
  • In a first example, the access-unit is the digital pen 1 which also comprises the checking means which comprise a memory in which coordinate areas and associated user identities are stored. Several users can have authorisation for the pen 1. Each user can have his own logging-in card 5. The logging-in card 5 can be a card which the user carries with him, for example in his wallet. When a user wishes to log in to the digital pen 1, he places it on the writing field 6 of the logging-in card 5, which is provided with a position-coding pattern 7 which is unique to the user. A part of the pattern is recorded optically by the digital pen 1. A program converts the pattern into coordinates which are transferred to the checking means. The checking means checks that the coordinates are lying within a predetermined coordinate area belonging to an authorised user. If yes, the user obtains access to the functions of the digital pen 1. Different users have different coordinate areas, which entails that it is possible to control which programs different users are to be able to access by the pen starting a different program depending on into which coordinate area the registered coordinates get. To increase security on logging-in, it can be required that a user writes his signature in the writing field. The signature is transferred to the checking means as a sequence of coordinates. The checking means also checks, in addition to the field within which the coordinates are located, if the sequence of coordinates for this coordinate area corresponds to an authorised sequence stored in the memory. It is then not enough that an unauthorised person obtains the writing base and pen, but the unauthorised person must also be able to forge the signature of the authorised user in order to gain access to the functions of the pen.
  • Logging-in to Computer
  • Fig. 2 shows a second embodiment of the invention, in which the access-protected unit is a computer 4, the user unit is a digital pen 1 and the checking means is available on the web in the form of a server unit 2. The server unit 2 handles a plurality of digital pens 1 and a plurality of computers 4.
  • The digital pen 1 is arranged to transfer information which is generated by the user to the server unit 2. In this example, the information is transferred wirelessly to a network-access unit 8 which, in turn, transfers the information to the server unit 2. The network-access unit 8 is a mobile telephone in this example. As an alternative, it can be a computer or some other suitable unit which has an interface with a network, for example the Internet or a local company network. As an alternative, the network-access unit can constitute an integrated part of the user unit.
  • The server unit 2 is a computer in a network of computers. It is constructed as a traditional server unit with one or more processors, memory of different types, peripheral units and couplings to other computers in the network but it has new software for carrying out the functions described here. It also has information stored in its memory in order to be able to handle these functions.
  • In the memory of the server unit 2, information on the coordinate areas is stored. The coordinate areas can be of different size and have different shape. A rectangular coordinate area, for example, can be described with the aid of pairs of coordinates which represent points in the corners of the coordinate area. The writing field 6 on the logging-in card 5 occupies one coordinate area.
  • In a data structure in the memory of the server unit 2, information or rules for each coordinate area are found which define how the information which can be associated with the coordinate area is to be processed.
  • Fig. 3 shows an example of such a structure which here constitutes a table. In a first column 30 of the table, the coordinate areas are defined with the aid of the coordinates (x1,y1; x2,y2; x3,y3; x4,y4) for the corners of the coordinate area which have been assumed to be rectangular in this case. In a second column 31, a representation of the signature of the authorised user is stored so that the server unit 2 can compare a received signature with a signature stored earlier. In a third column 32, a user identity is stored in the form of a serial number for the user unit 1 of the authorised user. Naturally, this is a very simple structure which is only used for illustrating the principles. Considerably more complex structures and rules for security checking are conceivable.
  • Fig. 4 shows a flow chart of the following embodiment of the method. When a user wishes to obtain access to a computer 4, he places the digital pen 1 on the writing field 6 and the pen 1 registers 100 the pattern 7 and calculates corresponding coordinates. The coordinates, together with a user identity stored in the user unit 1, are forwarded via the mobile telephone 8 to the server unit 2. The server unit 2 checks to which coordinate area the registered coordinates belong. Each computer 4 in the system is associated with at least one coordinate area. The server unit 2 determines in this way for which computer the access is intended. The server unit 2 then checks that the user identity has the authority 110 to log in to the computer for which the logging-in is intended. If the user has authority, a signal 120 is sent to the computer 4 for which the access is intended, which results in the user now being logged in to the computer 4. It is possible to send along special information from the server unit to the computer 4 concerned. This special information can comprise user-specific information which, for example, starts programs specific to the user. It can also be that different users obtain access to different amounts of information on the computer 4, which has the result that only certain parts of the content of the computer 4 are opened up to the user. If the user does not have authorisation for the computer 4, a message about this can be sent to the digital pen 1.
  • To increase the security in the system, the user also writes his signature on the writing field 6 of the logging-in card 5. The signature is registered as a sequence of coordinates and, together with the user identity stored in the user unit, is forwarded via the mobile telephone 8 to the server unit 2. The server unit 2 compares the received sequence of coordinates, i.e. the signature, with a previously stored sequence of coordinates with the user identity. If the received signature is determined to correspond, a signal is sent to the computer 4 and the user is logged in.
  • It is also possible to arrange the checking means in the computer 4, i.e. the access-protected unit. Logging-in to different entities
  • A third embodiment of the invention is similar to the second embodiment but in this embodiment the user can log-in to different physical entities and by writing a certain command chose which entity to log-in to. The writing field 6 is in this embodiment used to write a certain command associated with a certain physical entity for example a computer. In this embodiment the digital pen has a unique PIN (Personal Identification Number).
  • The digital pen is arranged to transfer the unique PIN and information, generated by the user, to the server unit.
  • In the memory of the server unit, information of the coordinate areas, commands and PINs are stored.
  • In a data structure in the memory of the server unit 2, information or rules for each coordinate area are found which defines how the coordinate area is to be processed.
  • Fig. 5 shows an example of such a structure which constitute a table. In a first column 40 of the table, the coordinate areas are defined with the aid of the coordinates (x1,y1; x2,y2) for determine the corners of the coordinate area which have been assumed to be rectangular in this case. In a second column 41, a representation of a command associated with an access-protected unit, which is represented in column 42, is stored. In a fourth column 43, a PIN is stored so that the server unit 2 can compare a received PIN with a PIN stored earlier. Naturally, this is a very simple structure which is only used for illustrating the principles. Considerably more complex structures and rules for security checking are conceivable.
  • When a user wishes to obtain access to a computer 4, he places the digital pen 1 on the writing field 6 and the pen registers the pattern 7 and calculates corresponding coordinates. The user writes the command "comp" to log-in to the computer. The pen registers the written command and calculates the relative corresponding coordinates. The pen then forwards the coordinates and the PIN "435 543" of the digital pen 1 via the mobile phone 8 to the server unit 2. The server unit checks to which coordinate area the registered coordinate belong. Each user in the system is associated with at least one coordinate area. The server unit then checks the command "comp" to determine which physical unit the user is logging in to. In this case "comp" is associated with "Computer 23". Thereafter it checks the PIN to determine if this pen in combination with the pattern 7 is allowed to have access to "Computer 23". If access is allowed the server unit 2 sends a signal to "Computer 23" and the user is logged in.
  • Non-recurrent Code
  • A predetermined coordinate area on a writing base can also function as a non-recurrent field which, after having been used once, is used up. This can be applicable, for example, when it is wished to be able to discard the writing base after use or when it is wished to keep it as a receipt for access to the system. It can be that the signature is also written on the base with ink, with the result that if an unauthorised person finds the slip, it can be relatively simple for him to follow the written signature and in this way obtain access to the access-protected unit. If, on the other hand, this pattern is used up, the only information remaining is the signature of the user.
  • Although special embodiments of the invention have been described above, it is obvious to a person skilled in the art that it is possible to produce many alternatives, modifications and variations in the light of the above description.

Claims (17)

  1. A system for access-control, comprising
    a plurality of bases (5), each of which has a writing field (6) provided with a position-coding pattern, which allows for the recording of handwritten user input and which codes coordinates within a coordinate area, wherein the position-coding patterns on at least two of the bases code coordinates within different coordinate areas,
    a plurality of user units (1), each of which is arranged to register at least one pair of coordinates from one of the bases, and
    at least one checking means (2) which is arranged to check, on the basis of at least one pair of coordinates recorded from one of said plurality of base by one of said plurality of user units, if the user of that user unit is authorised to access an access-protected unit (4), and if yes, to provide an enabling signal to the access-protected unit (4), wherein the checking means (2) stores information about at least one of said coordinate areas, and wherein the checking means (2) is arranged to check if said at least one pair of coordinates is lying anywhere within the at least one coordinate area.
  2. A system according to claim 1, wherein at least one of the user units (1) is arranged to register a user signature as a sequence of coordinates which describe displacement of the user unit when a user is writing the user signature with the user unit (1), and wherein said at least one pair of coordinates comprise the sequence of coordinates.
  3. A system according to claim 2, wherein the at least one checking means (2) is arranged to compare the sequence of coordinates with a previously stored sequence of coordinates for checking the authorisation of the user.
  4. A system according to any one of the preceding claims, wherein at least one of the user units (1) has a unique identification code and the at least one checking means is arranged to check the authorisation of the user with said identification code in combination with said at least one pair of coordinates.
  5. A system according to claim 4, wherein at least one of the user units is arranged to register a sequence of coordinates which is associated to a specific access-protected unit.
  6. A system according to any one of the preceding claims, wherein the at least one checking means (2) is integrated with at least one of the user units (1).
  7. A system according to any one of the preceding claims, wherein at least one of the user units comprises an access-protected unit (4).
  8. A system according to any one of the preceding claims, wherein the access-protected unit (4) is a digital pen.
  9. A system according to any one of the preceding claims, wherein information about a plurality of coordinate areas is stored in the at least one checking means (2).
  10. A system according to claim 9, wherein at least one of said plurality of coordinate areas is associated with an access-protected unit (4).
  11. A system according to claim 9, wherein if the user is authorised to access the access-protected unit (4), the access-protected unit (4) is arranged to start at least one function associated with at least one of said plurality of coordinate areas.
  12. A system according to claim 9, 10 or 11, wherein at least one authorised user identity is associated with at least one of said plurality of coordinate areas.
  13. A system according to any one of the preceding claims, wherein each one of the user units (1) comprise an optical sensor and image-processing means for registering said at least one pair of coordinates.
  14. A system according to claim 5, wherein information about at least one sequence of coordinates, which is associated to a specific access-protected unit, is stored in the checking means (2), wherein the checking means (2) being arranged to receive at least one sequence of coordinates from the user unit (1), to determine which access-protected unit the user is trying to access.
  15. A system according to claim 10, wherein two or more of said plurality of coordinate areas are associated with one and the same access-protected unit.
  16. A system according to any one of the preceding claims, wherein said at least one checking means is a server unit (2).
  17. A system according to claim 16, wherein the communication between at least one of the user units (1), said at least one checking means (2) and an access-protected unit (4) takes place in a computer network (3).
EP01916020A 2000-03-21 2001-03-21 Logging in Expired - Lifetime EP1269289B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP06114737A EP1698994A3 (en) 2000-03-21 2001-03-21 Logging in

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
SE0000942A SE0000942L (en) 2000-03-21 2000-03-21 Login
SE0000942 2000-03-21
PCT/SE2001/000592 WO2001071461A1 (en) 2000-03-21 2001-03-21 Logging in

Related Child Applications (1)

Application Number Title Priority Date Filing Date
EP06114737A Division EP1698994A3 (en) 2000-03-21 2001-03-21 Logging in

Publications (2)

Publication Number Publication Date
EP1269289A1 EP1269289A1 (en) 2003-01-02
EP1269289B1 true EP1269289B1 (en) 2006-05-31

Family

ID=20278896

Family Applications (2)

Application Number Title Priority Date Filing Date
EP06114737A Withdrawn EP1698994A3 (en) 2000-03-21 2001-03-21 Logging in
EP01916020A Expired - Lifetime EP1269289B1 (en) 2000-03-21 2001-03-21 Logging in

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP06114737A Withdrawn EP1698994A3 (en) 2000-03-21 2001-03-21 Logging in

Country Status (6)

Country Link
EP (2) EP1698994A3 (en)
AT (1) ATE328315T1 (en)
AU (1) AU2001242963A1 (en)
DE (1) DE60120134T2 (en)
SE (1) SE0000942L (en)
WO (1) WO2001071461A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8054512B2 (en) 2007-07-30 2011-11-08 Palo Alto Research Center Incorporated System and method for maintaining paper and electronic calendars

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE0104395L (en) * 2001-12-27 2003-06-28 Anoto Ab Ways of transferring information between a digital user device and a computer resource using position coding
KR100543699B1 (en) * 2003-01-21 2006-01-20 삼성전자주식회사 Method and Apparatus for user authentication
US10620754B2 (en) 2010-11-22 2020-04-14 3M Innovative Properties Company Touch-sensitive device with electrodes having location pattern included therein

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2201125A (en) * 1987-02-16 1988-08-24 De La Rue Syst Verification device
EP0407734A1 (en) * 1989-06-28 1991-01-16 International Business Machines Corporation Optical stylus and passive digitizing tablet data input system
EP0677801A1 (en) * 1994-04-04 1995-10-18 AT&T Corp. Graphical password
WO1999003070A1 (en) * 1997-07-08 1999-01-21 Jacques Rivailler Personal computer terminal capable of safely communicating with a computer equipment, and authenticating method used by said terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2104698B (en) * 1981-04-27 1985-08-21 Quest Automation An improved apparatus for signature verification
US5195133A (en) * 1991-01-11 1993-03-16 Ncr Corporation Apparatus and method for producing a digitized transaction record including an encrypted signature
EP0609384A1 (en) * 1991-10-23 1994-08-10 Electronic Ink Computer input system
EP0664912A4 (en) * 1992-10-13 1996-02-14 Zvi Orbach Apparatus for reading handwriting.
JPH11149454A (en) * 1997-09-10 1999-06-02 Fujitsu Ltd Authenticating device, user authenticating method, card for authenticating user and recording medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2201125A (en) * 1987-02-16 1988-08-24 De La Rue Syst Verification device
EP0407734A1 (en) * 1989-06-28 1991-01-16 International Business Machines Corporation Optical stylus and passive digitizing tablet data input system
EP0677801A1 (en) * 1994-04-04 1995-10-18 AT&T Corp. Graphical password
WO1999003070A1 (en) * 1997-07-08 1999-01-21 Jacques Rivailler Personal computer terminal capable of safely communicating with a computer equipment, and authenticating method used by said terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8054512B2 (en) 2007-07-30 2011-11-08 Palo Alto Research Center Incorporated System and method for maintaining paper and electronic calendars

Also Published As

Publication number Publication date
EP1269289A1 (en) 2003-01-02
WO2001071461A1 (en) 2001-09-27
EP1698994A2 (en) 2006-09-06
SE0000942D0 (en) 2000-03-21
SE0000942L (en) 2001-09-22
EP1698994A3 (en) 2006-11-22
DE60120134T2 (en) 2006-11-09
ATE328315T1 (en) 2006-06-15
DE60120134D1 (en) 2006-07-06
AU2001242963A1 (en) 2001-10-03

Similar Documents

Publication Publication Date Title
US7254839B2 (en) Secured access using a coordinate system
US6337918B1 (en) Computer system with integratable touchpad/security subsystem
US6836555B2 (en) Information management system with authenticity check
US7512806B2 (en) Security technique for controlling access to a network by a wireless device
NL1023241C2 (en) Data storage device that is protected with biometric parameters, has a serial computer bus interface and is portable, and method for its own biometric registration.
JP4800312B2 (en) Communication device, communication system
US6722574B2 (en) Business card
US20160140379A1 (en) Improvements in or relating to user authentication
US20090191846A1 (en) Biometric smart card for mobile devices
US20070107042A1 (en) System and method for limiting access to a shared multi-functional peripheral device
US7082444B2 (en) Method and system for identifying a form version
WO2005064447A2 (en) Electronic device with finger sensor for character entry and associated methods
KR20020063919A (en) Information management system with authenticity check
US7331530B2 (en) Method of obtaining at least a portion of a document
US20060146023A1 (en) Mobile computer mouse
US6353472B1 (en) Device for authenticating a person on the basis of his fingerprints
US20080018619A1 (en) Method and system for electronically storing data on a document
US20070095900A1 (en) Method and system for securely encoding and decoding biometric data into a memory device using a two dimensional symbol
US20090044022A1 (en) Secure verification system
EP1269289B1 (en) Logging in
US20140298024A1 (en) Method for granting access to a network and device for implementing this method
JP2003346098A (en) Personal identification system and method and terminal device for personal identification
JP2004153612A (en) System and program for electronic signature
JPH09330140A (en) Personal computer device
JP2002304230A (en) Person authentication system, and input device

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20021021

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Free format text: AL PAYMENT 20021021;LT PAYMENT 20021021;LV PAYMENT 20021021;MK PAYMENT 20021021;RO PAYMENT 20021021;SI PAYMENT 20021021

RIN1 Information on inventor provided before grant (corrected)

Inventor name: F HRAEUS, CHRISTER

Inventor name: ERICSON, PETTER

Inventor name: KARLSSON, SVEN, OLOF

17Q First examination report despatched

Effective date: 20040326

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: ANOTO IP LIC HB

111L Licence recorded

Free format text: 0100 LEAPFROG ENTERPRISES INC.

Effective date: 20050530

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Extension state: AL LT LV MK RO SI

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060531

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060531

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060531

Ref country code: CH

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060531

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060531

Ref country code: LI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060531

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED.

Effective date: 20060531

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

Ref country code: GB

Ref legal event code: FG4D

RIN1 Information on inventor provided before grant (corrected)

Inventor name: KARLSSON, SVEN, OLOF

Inventor name: ERICSON, PETTER

Inventor name: FAHRAEUS, CHRISTER

RAP2 Party data changed (patent owner data changed or rights of a patent transferred)

Owner name: ANOTO AB

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REF Corresponds to:

Ref document number: 60120134

Country of ref document: DE

Date of ref document: 20060706

Kind code of ref document: P

NLT2 Nl: modifications (of names), taken from the european patent patent bulletin

Owner name: ANOTO AB

Effective date: 20060607

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060831

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060831

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060911

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20061031

NLV1 Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act
LTIE Lt: invalidation of european patent or patent extension

Effective date: 20060531

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

ET Fr: translation filed
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20070301

REG Reference to a national code

Ref country code: FR

Ref legal event code: TP

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20070321

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20070331

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060901

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20070321

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060531

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20130314

Year of fee payment: 13

Ref country code: FR

Payment date: 20130325

Year of fee payment: 13

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 60120134

Country of ref document: DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20141128

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 60120134

Country of ref document: DE

Effective date: 20141001

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20140331

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20141001

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20160316

Year of fee payment: 16

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20170321

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170321